Spring Data Commons における入力確認に関する脆弱性
| Title |
Spring Data Commons における入力確認に関する脆弱性
|
| Summary |
Spring Data Commons には、入力確認に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
April 10, 2018, midnight |
| Registration Date |
June 19, 2018, 11:30 a.m. |
| Last Update |
June 19, 2018, 11:30 a.m. |
|
CVSS3.0 : 緊急
|
| Score |
9.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
Affected System
| Pivotal Software, Inc. |
|
Spring Data Commons 1.13 から 1.13.10
|
|
Spring Data Commons 2.0 から 2.0.5
|
|
Spring Data REST 2.6 から 2.6.10
|
|
Spring Data REST 3.0 から 3.0.5
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年06月19日] 掲載 |
June 19, 2018, 11:30 a.m. |
NVD Vulnerability Information
CVE-2018-1273
| Summary |
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
|
| Publication Date |
April 11, 2018, 10:29 p.m. |
| Registration Date |
March 1, 2021, 6:50 p.m. |
| Last Update |
Nov. 21, 2024, 12:59 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:* |
|
1.12.10 |
|
|
| cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:* |
1.13.0 |
1.13.10 |
|
|
| cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:* |
2.0.0 |
2.0.5 |
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:pivotal_software:spring_data_rest:*:*:*:*:*:*:*:* |
|
2.5.10 |
|
|
| cpe:2.3:a:pivotal_software:spring_data_rest:*:*:*:*:*:*:*:* |
2.6.0 |
2.6.10 |
|
|
| cpe:2.3:a:pivotal_software:spring_data_rest:*:*:*:*:*:*:*:* |
3.0.0 |
3.0.5 |
|
|
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:apache:ignite:1.0.0:rc3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:apache:ignite:1.0.0:-:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:apache:ignite:*:*:*:*:*:*:*:* |
1.0.1 |
2.5.0 |
|
|
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List